Challenges and available solutions against organized cyber-crime and terrorist networks

Andrea Tundis, Florian Huber, Bernhard Jäger, Jörg Daubert, Emmanouil Vasilomanolakis, Max Mühlhäuser

Research output: Contribution to journalJournal articleResearchpeer-review

9 Citations (Scopus)

Abstract

Organized Crime (OC) and Terrorist Networks (TN) have risen to major and persistent threats for the European Union and its population. The IT growth of the past decade caused a migration of OC/TN to the cyber domain as well as the introduction of cybercrime. As a consequence, the technological dimensions of criminal activities are becoming more relevant and challenges ranging from the identification of criminal activities up to the understanding of engagement processes, are even more complicated. In this context, this paper aims to provide a discussion on OC and TN by pointing out organizational models, similarities, distinguishing features and differences in terms of their objectives. Furthermore, the main issues and available categories of solutions, in terms of models, methods and software tools are described. Finally, the importance of innovative digital and non-digital solutions is discussed as well as the current research directions are highlighted.

Original languageEnglish
Book seriesWIT Transactions on The Built Environment
Volume174
Pages (from-to)429-441
Number of pages13
ISSN1743-3509
DOIs
Publication statusPublished - 2018
Externally publishedYes

Bibliographical note

Funding Information:
ACKNOWLEDGMENT The work in this paper is performed in the context of the TAKEDOWN research project, which receives funding from the European Union’s Horizon 2020 Research and Innovation Programme under Grant Agreement no 700688.

Publisher Copyright:
© 2018 WIT Press.

Keywords

  • Cyber security
  • Cyber terrorism
  • Cybercrime
  • Organized crime
  • Terrorist networks

Fingerprint

Dive into the research topics of 'Challenges and available solutions against organized cyber-crime and terrorist networks'. Together they form a unique fingerprint.

Cite this